Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats

被引:11
|
作者
Baksi, Rudra P. [1 ]
Upadhyaya, Shambhu J. [1 ]
机构
[1] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
基金
美国国家科学基金会;
关键词
Advanced Persistent Threats (APT); Computer security; Cyber-security; Hidden Markov Model (HMM); Ransomware;
D O I
10.1007/s10796-020-10087-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deception has been proposed in the literature as an effective defense mechanism to address Advanced Persistent Threats (APT). However, administering deception in a cost-effective manner requires a good understanding of the attack landscape. The attacks mounted by APT groups are highly diverse and sophisticated in nature and can render traditional signature based intrusion detection systems useless. This necessitates the development of behavior oriented defense mechanisms. In this paper, we develop Decepticon (Deception-based countermeasure), a Hidden Markov Model based framework where the indicators of compromise (IoC) are used as the observable features to aid in detection. This theoretical framework also includes several models to represent the spread of APTs in a computer system. The presented framework can be used to select an appropriate deception script when faced with APTs or other similar malware and trigger an appropriate defensive response. The effectiveness of the models in a networked system is illustrated by considering a real APT type ransomware.
引用
收藏
页码:897 / 913
页数:17
相关论文
共 50 条
  • [1] Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats
    Rudra P. Baksi
    Shambhu J. Upadhyaya
    [J]. Information Systems Frontiers, 2021, 23 : 897 - 913
  • [2] Surviving Advanced Persistent Threats - a Framework and Analysis
    Mehresh, Ruchika
    Upadhyaya, Shambhu
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 445 - 454
  • [3] A Context-Based Detection Framework for Advanced Persistent Threats
    Giura, Paul
    Wang, Wei
    [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 69 - 74
  • [4] An Analytical Framework to Address the Data Exfiltration of Advanced Persistent Threats
    Nar, Kamil
    Sastry, S. Shankar
    [J]. 2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 867 - 873
  • [5] Advanced Persistent Threats
    Ozzengin, Yavuz Selim
    Sakiz, Fatih
    Benzer, Recep
    [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1845 - 1848
  • [6] On-line Shared Platform Evaluation Framework for Advanced Persistent Threats
    Sohn, Dongsik
    Lee, Taejin
    Kwak, Jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2610 - 2628
  • [7] A Network Gene-Based Framework for Detecting Advanced Persistent Threats
    Wang, Yuan
    Wang, Yongjun
    Liu, Jing
    Huang, Zhijian
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 97 - 102
  • [8] A Study on Advanced Persistent Threats
    Chen, Ping
    Desmet, Lieven
    Huygens, Christophe
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 63 - 72
  • [9] DFA-AD: a distributed framework architecture for the detection of advanced persistent threats
    Sharma, Pradip Kumar
    Moon, Seo Yeon
    Moon, Daesung
    Park, Jong Hyuk
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (01): : 597 - 609
  • [10] Towards a Framework to Detect Multi-Stage Advanced Persistent Threats Attacks
    Bhatt, Parth
    Yano, Edgar Toshiro
    Gustavsson, Per M.
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 390 - 395